[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <56F420DA.7040302@redhat.com>
Date: Thu, 24 Mar 2016 13:16:10 -0400
From: Prarit Bhargava <prarit@...hat.com>
To: Rasmus Villemoes <linux@...musvillemoes.dk>,
Oleg Nesterov <oleg@...hat.com>,
Rusty Russell <rusty@...tcorp.com.au>
CC: Andrew Morton <akpm@...ux-foundation.org>,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH resend] init/main.c: Simplify initcall_blacklisted()
On 03/21/2016 07:14 PM, Rasmus Villemoes wrote:
> Using kasprintf to get the function name makes us look up the name
> twice, along with all the vsnprintf overhead of parsing the format
> string etc. It also means there is an allocation failure case to deal
> with. Since symbol_string in vsprintf.c would anyway allocate an array
> of size KSYM_SYMBOL_LEN on the stack, that might as well be done up
> here.
>
> Moreover, since this is a debug feature and the blacklisted_initcalls
> list is usually empty, we might as well test that and thus avoid
> looking up the symbol name even once in the common case.
>
> Signed-off-by: Rasmus Villemoes <linux@...musvillemoes.dk>
Acked-by: Prarit Bhargava <prarit@...hat.com>
P.
> ---
> init/main.c | 9 ++++-----
> 1 file changed, 4 insertions(+), 5 deletions(-)
>
> diff --git a/init/main.c b/init/main.c
> index b3c6e363ae18..d76d94cd537c 100644
> --- a/init/main.c
> +++ b/init/main.c
> @@ -706,21 +706,20 @@ static int __init initcall_blacklist(char *str)
> static bool __init_or_module initcall_blacklisted(initcall_t fn)
> {
> struct blacklist_entry *entry;
> - char *fn_name;
> + char fn_name[KSYM_SYMBOL_LEN];
>
> - fn_name = kasprintf(GFP_KERNEL, "%pf", fn);
> - if (!fn_name)
> + if (list_empty(&blacklisted_initcalls))
> return false;
>
> + sprint_symbol_no_offset(fn_name, (unsigned long)fn);
> +
> list_for_each_entry(entry, &blacklisted_initcalls, next) {
> if (!strcmp(fn_name, entry->buf)) {
> pr_debug("initcall %s blacklisted\n", fn_name);
> - kfree(fn_name);
> return true;
> }
> }
>
> - kfree(fn_name);
> return false;
> }
> #else
>
Powered by blists - more mailing lists